shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆154Updated 3 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆609Updated 5 months ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆308Updated 8 months ago
- MacStealer: Wi-Fi Client Isolation Bypass☆524Updated 3 weeks ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆309Updated 5 years ago
- Recovers pixelized text from images☆232Updated 3 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆121Updated last year
- airprobe already patched to GnuRadio 3.7 and some adaptations to be used with cellanalysis using USRP and RTLSDR☆47Updated 8 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago
- A rainbow table implementation for non-uniform inputs, such as phone numbers.☆25Updated 4 years ago
- Bluesniff☆88Updated 10 years ago
- ☆232Updated 2 years ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆464Updated 3 years ago
- Figlet fonts for crimes☆48Updated last year
- Independent research white paper by Jon “GainSec” Gaines examining the security posture of a connected public safety technology ecosystem…☆147Updated last month
- SoniControl - the first ultrasonic firewall☆96Updated 2 years ago
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆52Updated 5 years ago
- ☆134Updated 6 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- Poor mans Bash Bunny☆87Updated 7 years ago
- Nmap for Bluetooth Low Energy☆203Updated last year
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,223Updated 2 years ago
- its like a tricorder, for your wireless world.☆116Updated last year
- A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool☆285Updated 4 years ago
- Hash identification program.☆153Updated 3 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆243Updated 11 months ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆349Updated last year
- An implementation of TEMPEST en GNU Radio☆626Updated 11 months ago
- A ZigBee hacking toolkit by Bishop Fox☆287Updated 4 years ago